Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 18:04
Behavioral task
behavioral1
Sample
87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe
Resource
win7-20240221-en
General
-
Target
87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe
-
Size
69KB
-
MD5
1bcc48211ca31660a585b931eb987f93
-
SHA1
6633d480598a27f756a8ce706e4392b294ccc8ec
-
SHA256
87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347
-
SHA512
7704148f1e83bf97e8a6ff7f36b7fc56dee6a2175be55f1c8c9a2629a66d4d19635bfa03a7f4c92b7cbf4fbd27b014a2a2fa58dcc734fd560dab0a9977b3cf86
-
SSDEEP
1536:Ju4n9Tswb2ksLtF3buXSumtVoGB7dTxYIbdS6w:Ju49Tswb2VLtF3bugbhJxYIbML
Malware Config
Extracted
asyncrat
0.5.8
Default
94.156.68.217:3162
sz1D8OiE4OiM
-
delay
3
-
install
true
-
install_file
MicrosoftCompabilityTelemtry.exe
-
install_folder
%AppData%
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchosts.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001224d-9.dat family_asyncrat -
Executes dropped EXE 3 IoCs
pid Process 2492 MicrosoftCompabilityTelemtry.exe 2592 svchosts.exe 284 MicrosoftCompabilityTelemtry.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchosts.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchosts.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 discord.com 5 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2448 schtasks.exe 1792 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2464 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2492 MicrosoftCompabilityTelemtry.exe 2492 MicrosoftCompabilityTelemtry.exe 2492 MicrosoftCompabilityTelemtry.exe 1604 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 svchosts.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2592 svchosts.exe Token: SeDebugPrivilege 2492 MicrosoftCompabilityTelemtry.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 284 MicrosoftCompabilityTelemtry.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2492 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 28 PID 2208 wrote to memory of 2492 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 28 PID 2208 wrote to memory of 2492 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 28 PID 2208 wrote to memory of 2492 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 28 PID 2208 wrote to memory of 2592 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 29 PID 2208 wrote to memory of 2592 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 29 PID 2208 wrote to memory of 2592 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 29 PID 2208 wrote to memory of 2592 2208 87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe 29 PID 2492 wrote to memory of 2524 2492 MicrosoftCompabilityTelemtry.exe 30 PID 2492 wrote to memory of 2524 2492 MicrosoftCompabilityTelemtry.exe 30 PID 2492 wrote to memory of 2524 2492 MicrosoftCompabilityTelemtry.exe 30 PID 2492 wrote to memory of 2524 2492 MicrosoftCompabilityTelemtry.exe 30 PID 2492 wrote to memory of 2380 2492 MicrosoftCompabilityTelemtry.exe 32 PID 2492 wrote to memory of 2380 2492 MicrosoftCompabilityTelemtry.exe 32 PID 2492 wrote to memory of 2380 2492 MicrosoftCompabilityTelemtry.exe 32 PID 2492 wrote to memory of 2380 2492 MicrosoftCompabilityTelemtry.exe 32 PID 2524 wrote to memory of 2448 2524 cmd.exe 34 PID 2524 wrote to memory of 2448 2524 cmd.exe 34 PID 2524 wrote to memory of 2448 2524 cmd.exe 34 PID 2524 wrote to memory of 2448 2524 cmd.exe 34 PID 2380 wrote to memory of 2464 2380 cmd.exe 35 PID 2380 wrote to memory of 2464 2380 cmd.exe 35 PID 2380 wrote to memory of 2464 2380 cmd.exe 35 PID 2380 wrote to memory of 2464 2380 cmd.exe 35 PID 2592 wrote to memory of 1628 2592 svchosts.exe 36 PID 2592 wrote to memory of 1628 2592 svchosts.exe 36 PID 2592 wrote to memory of 1628 2592 svchosts.exe 36 PID 2592 wrote to memory of 1628 2592 svchosts.exe 36 PID 2592 wrote to memory of 1568 2592 svchosts.exe 38 PID 2592 wrote to memory of 1568 2592 svchosts.exe 38 PID 2592 wrote to memory of 1568 2592 svchosts.exe 38 PID 2592 wrote to memory of 1568 2592 svchosts.exe 38 PID 1628 wrote to memory of 1604 1628 cmd.exe 40 PID 1628 wrote to memory of 1604 1628 cmd.exe 40 PID 1628 wrote to memory of 1604 1628 cmd.exe 40 PID 1628 wrote to memory of 1604 1628 cmd.exe 40 PID 1568 wrote to memory of 1792 1568 cmd.exe 41 PID 1568 wrote to memory of 1792 1568 cmd.exe 41 PID 1568 wrote to memory of 1792 1568 cmd.exe 41 PID 1568 wrote to memory of 1792 1568 cmd.exe 41 PID 2380 wrote to memory of 284 2380 cmd.exe 42 PID 2380 wrote to memory of 284 2380 cmd.exe 42 PID 2380 wrote to memory of 284 2380 cmd.exe 42 PID 2380 wrote to memory of 284 2380 cmd.exe 42 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchosts.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe"C:\Users\Admin\AppData\Local\Temp\87e382fef7c2e0010af6532600c22578d26d041a78a1c3ec16dbf0d5eb39f347.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftCompabilityTelemtry.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftCompabilityTelemtry.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MicrosoftCompabilityTelemtry" /tr '"C:\Users\Admin\AppData\Roaming\MicrosoftCompabilityTelemtry.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MicrosoftCompabilityTelemtry" /tr '"C:\Users\Admin\AppData\Roaming\MicrosoftCompabilityTelemtry.exe"'4⤵
- Creates scheduled task(s)
PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1890.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2464
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftCompabilityTelemtry.exe"C:\Users\Admin\AppData\Roaming\MicrosoftCompabilityTelemtry.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exe"C:\Users\Admin\AppData\Local\Temp\svchosts.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\,C:\Users\Admin\AppData\Roaming3⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\,C:\Users\Admin\AppData\Roaming4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn svchosts /tr C:\Users\Admin\AppData\Roaming\svchosts.exe /sc onlogon3⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn svchosts /tr C:\Users\Admin\AppData\Roaming\svchosts.exe /sc onlogon4⤵
- Creates scheduled task(s)
PID:1792
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
45KB
MD5fee8e7725f89e5b99e165996d89e0d29
SHA1827fe03932f7c557703f62b4eec683eb1a14b9c2
SHA256b56464ef35b43d5e04a3fe655c2e80567fa67acb396221357b852e04952d0809
SHA51211adb2c2320c21848ecca24cc542a17fc7bf80e74ef54b4f7e1ec088af5614ad04db64ab3ae1b9a8bf7106aaa6355a8ef686b4839a5756405b76425edcf6685e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
12KB
MD50ade14069ec4dafe0f02c419da0f9ddd
SHA101fce38588ec0cbb6d17be718ba5867551180e32
SHA2567df0b72ac5875dc5025d2f1e8d1eaa2cac1a4c58f2289603c852d2f9e191c948
SHA51243e448d4bf3e25d6b154bf98da25dc183404ff35515029570f4554fa048d14ef208c4a8c7ac1024718abbb96c73c3e94ca8c5bcf8f8e8852c152b8c13959c92e
-
Filesize
172B
MD50957031fe874300fb62cd02c3b048aff
SHA1372146ed0a6a4b4450b473c0f816dd855c463516
SHA256f4e0984370c17cd279cd0f4d1d7e04d0e92d871b6171c0645d6360631f0f715c
SHA512caeedb83e8151ab352a893fb694dc71c2b3edcfc3bf2f744552c579a31503fa31d20c29d126a423d0e5d2f1fa2396f9974355e245b7afcf086c1e2ebfa78cd37